{"vulnerability": "CVE-2023-51441", "sightings": [{"uuid": "25c62830-ab7a-4e82-a588-b23fb582fcd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51441", "type": "seen", "source": "https://t.me/ctinow/172825", "content": "https://ift.tt/WQ5x2jL\nCVE-2023-51441 | Apache Axis 1.x Service Admin HTTP API ServiceFactory.java server-side request forgery", "creation_timestamp": "2024-01-24T15:16:36.000000Z"}, {"uuid": "40d123ec-c340-4a2f-af05-7526953a414b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51441", "type": "seen", "source": "https://t.me/ctinow/163925", "content": "https://ift.tt/MfYFraL\nCVE-2023-51441", "creation_timestamp": "2024-01-06T13:21:23.000000Z"}, {"uuid": "43af0bf4-94d2-4b33-baee-d8675ef9523f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51441", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2680", "content": "#ExploitObserverAlert\n\nCVE-2023-51441\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-51441. ** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF This issue affects Apache Axis: through 1.3.  As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from  https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06  applied. The Apache Axis project does not expect to create an Axis 1.x release  fixing this problem, though contributors that would like to work towards  this are welcome.", "creation_timestamp": "2024-01-08T20:38:46.000000Z"}]}